Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
156845b1bf7447d5131a1392b2809f27.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
156845b1bf7447d5131a1392b2809f27.exe
Resource
win10v2004-20220901-en
General
-
Target
156845b1bf7447d5131a1392b2809f27.exe
-
Size
528KB
-
MD5
156845b1bf7447d5131a1392b2809f27
-
SHA1
a525aa16b7fe1dc7a568f509861fce60f957f525
-
SHA256
9255b7a154698669aa8d751692d350651653054f0190f4963e8c28edb37afcc5
-
SHA512
ff68feb16255008591ffc2d2487639e217f1d95fa35fafdc43c314d3a0746a6375eaf52ee1ceb486957cd63d261442c9d9df7e23d1e0a9d2c8e83d0b78ff3096
-
SSDEEP
12288:OMrVy90DAo5EyqQ7svdj8POHb9KSTOocNk:HyA5EdQ7kiPsdcNk
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sYC88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sYC88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sYC88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sYC88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sYC88.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sYC88.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3412 vXp80.exe 1804 dQx82.exe 208 nCc88rL.exe 4488 sYC88.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sYC88.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vXp80.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 156845b1bf7447d5131a1392b2809f27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 156845b1bf7447d5131a1392b2809f27.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vXp80.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4892 1804 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1804 dQx82.exe 1804 dQx82.exe 208 nCc88rL.exe 208 nCc88rL.exe 4488 sYC88.exe 4488 sYC88.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1804 dQx82.exe Token: SeDebugPrivilege 208 nCc88rL.exe Token: SeDebugPrivilege 4488 sYC88.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3412 1952 156845b1bf7447d5131a1392b2809f27.exe 83 PID 1952 wrote to memory of 3412 1952 156845b1bf7447d5131a1392b2809f27.exe 83 PID 1952 wrote to memory of 3412 1952 156845b1bf7447d5131a1392b2809f27.exe 83 PID 3412 wrote to memory of 1804 3412 vXp80.exe 84 PID 3412 wrote to memory of 1804 3412 vXp80.exe 84 PID 3412 wrote to memory of 1804 3412 vXp80.exe 84 PID 3412 wrote to memory of 208 3412 vXp80.exe 87 PID 3412 wrote to memory of 208 3412 vXp80.exe 87 PID 3412 wrote to memory of 208 3412 vXp80.exe 87 PID 1952 wrote to memory of 4488 1952 156845b1bf7447d5131a1392b2809f27.exe 88 PID 1952 wrote to memory of 4488 1952 156845b1bf7447d5131a1392b2809f27.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\156845b1bf7447d5131a1392b2809f27.exe"C:\Users\Admin\AppData\Local\Temp\156845b1bf7447d5131a1392b2809f27.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vXp80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vXp80.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQx82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQx82.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 17804⤵
- Program crash
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nCc88rL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nCc88rL.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sYC88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sYC88.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1804 -ip 18041⤵PID:2968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
424KB
MD5da907eb8a286ac0efcfbffdc26a0fe11
SHA118954e048e815a83103d5ce0fcae5eb8f28188fa
SHA256427c00e6d41644be91ea2c4a8e2694bf8b2ee1758d0225725a576f89da9fef09
SHA51217ee65852ce2cb9a0b89e3869f4925f0d2095f0ac794c66c6421bb08abf2b191e9e4699d0d6e1d0bd70d140737e81877b49125fb88c2595d95bb7b9fb649b311
-
Filesize
424KB
MD5da907eb8a286ac0efcfbffdc26a0fe11
SHA118954e048e815a83103d5ce0fcae5eb8f28188fa
SHA256427c00e6d41644be91ea2c4a8e2694bf8b2ee1758d0225725a576f89da9fef09
SHA51217ee65852ce2cb9a0b89e3869f4925f0d2095f0ac794c66c6421bb08abf2b191e9e4699d0d6e1d0bd70d140737e81877b49125fb88c2595d95bb7b9fb649b311
-
Filesize
278KB
MD56e88575e5a8289855c38133d70e4466d
SHA1f4dba78bb2db07d4964846d2707136ea7078566a
SHA2565dddea590a2fa5de71f11a70e98cec2735f106ebe59d84c79f465c2744b89556
SHA512a4712145bbf4d16d75ed65754c80397f08195917b65ab7f86d8fbb1d9820f7f0c45644045001def0708192387144640850d49aed40cc7a976c1e07b1c622f03c
-
Filesize
278KB
MD56e88575e5a8289855c38133d70e4466d
SHA1f4dba78bb2db07d4964846d2707136ea7078566a
SHA2565dddea590a2fa5de71f11a70e98cec2735f106ebe59d84c79f465c2744b89556
SHA512a4712145bbf4d16d75ed65754c80397f08195917b65ab7f86d8fbb1d9820f7f0c45644045001def0708192387144640850d49aed40cc7a976c1e07b1c622f03c
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236